Vulnerability identifier: #VU56610
Vulnerability risk: Low
Exploitation vector: Network
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when sending data to an MQTT server. A remote attacker with ability to control libcurl input can trigger a double free error and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versions
cURL: 7.73.0 - 7.78.0
Fixed software versions
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?